{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:08:03Z","timestamp":1772122083367,"version":"3.50.1"},"reference-count":25,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:p> When income, assets, sales, and profits are inflated while expenditures, debts, and losses are artificially lowered, the outcome is a set of fraudulent financial statements (FFS). Manual auditing and inspections are time-consuming, inefficient, and expensive options for spotting these false statements. Auditors will find great assistance from the use of intelligent methods in the analysis of several financial declarations. Now more than ever, victims of financial fraud are at risk since more and more individuals are using the Internet to conduct their financial transactions. And the frauds are getting more complex, evading the protections that banks have put in place. In this paper, we offer a new-fangled method for detecting fraud using NLP models: an ensemble model comprising Feedforward neural networks (FNNs) and Long Short-Term Memories (LSTMs). The Spotted Hyena Optimizer is a unique metaheuristic optimization technique used to choose weights and biases for LSTM (SHO). The proposed method takes inspiration from the law of gravity and is meant to mimic the group dynamics of spotted hyenas. Mathematical models and discussions of the three fundamental phases of SHO \u2014 searching for prey, encircling prey, and at-tacking prey \u2014 are presented. We build a model of the user\u2019s spending habits and look for suspicious outliers to identify fraud. We do this by using the ensemble mechanism, which helps us predict and make the most of previous trades. Based on our analysis of real-world data, we can confidently say that our model provides superior performance compared to state-of-the-art approaches in a variety of settings, with respect to both precision and. <\/jats:p>","DOI":"10.1142\/s0218843023500247","type":"journal-article","created":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T05:04:22Z","timestamp":1695445462000},"source":"Crossref","is-referenced-by-count":10,"title":["Detection of Banking Financial Frauds Using Hyper-Parameter Tuning of DL in Cloud Computing Environment"],"prefix":"10.1142","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6997-9116","authenticated-orcid":false,"given":"Kamal","family":"Upreti","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Dr. Akhilesh Das Gupta Institute of Technology and Management, New Delhi, India"}]},{"given":"Prashant","family":"Vats","sequence":"additional","affiliation":[{"name":"Department of CSE, SCSE, Faculty of Engineering, Manipal University Jaipur, Jaipur, Rajasthan, India"}]},{"given":"Aravindan","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India"}]},{"given":"K. V.","family":"Daya Sagar","sequence":"additional","affiliation":[{"name":"Department of Electronics and Computer Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India"}]},{"given":"R.","family":"Mahaveerakannan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, Tamil Nadu, India"}]},{"given":"G.","family":"Charles Babu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Gokaraju Rangaraju Institute of Engineering and Technology (Autonomous), Bachupally, Hyderabad, Telangana, India"}]}],"member":"219","published-online":{"date-parts":[[2023,10,6]]},"reference":[{"key":"S0218843023500247BIB001","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6079582"},{"key":"S0218843023500247BIB003","doi-asserted-by":"crossref","first-page":"101","DOI":"10.32604\/jai.2021.026851","volume":"3","author":"Chen J.","year":"2021","journal-title":"J. Artif. Intell."},{"key":"S0218843023500247BIB004","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.138"},{"key":"S0218843023500247BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3096799"},{"key":"S0218843023500247BIB006","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100402"},{"key":"S0218843023500247BIB007","volume-title":"2021 7th Int. Conf. Electrical Energy Systems (ICEES)","author":"Priya G. J.","year":"2021"},{"key":"S0218843023500247BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3134330"},{"key":"S0218843023500247BIB009","first-page":"163","volume-title":"Machine Learning Technologies and Applications: Proc. ICACECS 2020","author":"Rao N. V. K.","year":"2021"},{"key":"S0218843023500247BIB010","first-page":"216","volume":"9","author":"More R.","year":"2021","journal-title":"Int. J. Sci. Technol."},{"key":"S0218843023500247BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.xinn.2021.100176"},{"key":"S0218843023500247BIB012","author":"Raiter O.","year":"2021","journal-title":"J. Mod. Iss. Bus. Res."},{"key":"S0218843023500247BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.023"},{"key":"S0218843023500247BIB014","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9293877"},{"key":"S0218843023500247BIB015","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-981-15-5285-4_12","volume-title":"Intelligence in Big Data Technologies \u2014 Beyond the Hype: Proc. ICBDCC 2019","volume":"1167","author":"Cynthia P. C.","year":"2020"},{"key":"S0218843023500247BIB016","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.210203.007"},{"key":"S0218843023500247BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14365-6"},{"key":"S0218843023500247BIB018","doi-asserted-by":"publisher","DOI":"10.3390\/app13031764"},{"key":"S0218843023500247BIB019","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2022.2163983"},{"key":"S0218843023500247BIB020","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010232"},{"key":"S0218843023500247BIB021","doi-asserted-by":"publisher","DOI":"10.2174\/9789815165197123010015"},{"key":"S0218843023500247BIB022","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119698"},{"key":"S0218843023500247BIB023","doi-asserted-by":"publisher","DOI":"10.24018\/ejece.2023.7.1.475"},{"key":"S0218843023500247BIB024","first-page":"1","volume":"13","author":"Krishnan S.","year":"2022","journal-title":"Int. J. Secur."},{"key":"S0218843023500247BIB025","doi-asserted-by":"publisher","DOI":"10.53106\/160792642023052403015"},{"key":"S0218843023500247BIB026","first-page":"24","volume":"12","author":"Krishnan S.","year":"2021","journal-title":"Int. J. Comput. Linguist."}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218843023500247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T08:03:13Z","timestamp":1741075393000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218843023500247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,6]]},"references-count":25,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10.1142\/S0218843023500247"],"URL":"https:\/\/doi.org\/10.1142\/s0218843023500247","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"value":"0218-8430","type":"print"},{"value":"1793-6365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,6]]},"article-number":"2350024"}}